Results 51 to 60 of about 199,623 (310)

Benchmark Tests for the Model-Checking-Based IDS Algorithms

open access: yesIEEE Access, 2019
A fundamental concern for the security community is to identify the comprehensive comparable performance of various intrusion detection algorithms which are based on the Model Checking (MC) techniques. To address this open issue, we conduct the benchmark
Miaolei Deng   +4 more
doaj   +1 more source

Intrusion Detection Using Mouse Dynamics

open access: yes, 2018
Compared to other behavioural biometrics, mouse dynamics is a less explored area. General purpose data sets containing unrestricted mouse usage data are usually not available.
Antal, Margit, Egyed-Zsigmond, Elod
core   +2 more sources

A stepwise emergence of evolution in the RNA world

open access: yesFEBS Letters, EarlyView.
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley   +1 more source

A consensus based network intrusion detection system

open access: yes, 2015
Network intrusion detection is the process of identifying malicious behaviors that target a network and its resources. Current systems implementing intrusion detection processes observe traffic at several data collecting points in the network but ...
Curtis, Philip   +2 more
core   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

Intrusion Detection Based on Adaptive Sample Distribution Dual-Experience Replay Reinforcement Learning

open access: yesMathematics
In order to cope with ever-evolving and increasing cyber threats, intrusion detection systems have become a crucial component of cyber security. Compared with signature-based intrusion detection methods, anomaly-based methods typically employ machine ...
Haonan Tan   +3 more
doaj   +1 more source

Efficient Computer Network Anomaly Detection by Changepoint Detection Methods

open access: yes, 2012
We consider the problem of efficient on-line anomaly detection in computer network traffic. The problem is approached statistically, as that of sequential (quickest) changepoint detection.
Polunchenko, Aleksey S.   +2 more
core   +1 more source

Circulating histones as clinical biomarkers in critically ill conditions

open access: yesFEBS Letters, EarlyView.
Circulating histones are emerging as promising biomarkers in critical illness due to their diagnostic, prognostic, and therapeutic potential. Detection methods such as ELISA and mass spectrometry provide reliable approaches for quantifying histone levels in plasma samples.
José Luis García‐Gimenez   +17 more
wiley   +1 more source

Efficient classification using parallel and scalable compressed model and Its application on intrusion detection

open access: yes, 2014
In order to achieve high efficiency of classification in intrusion detection, a compressed model is proposed in this paper which combines horizontal compression with vertical compression.
Chen, Tieming   +3 more
core   +1 more source

Cyclic nucleotide signaling as a drug target in retinitis pigmentosa

open access: yesFEBS Letters, EarlyView.
Disruptions in cGMP and cAMP signaling can contribute to retinal dysfunction and photoreceptor loss in retinitis pigmentosa. This perspective examines the mechanisms and evaluates emerging evidence on targeting these pathways as a potential therapeutic strategy to slow or prevent retinal degeneration.
Katri Vainionpää   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy